The looming threat of . . . Cyber crimes

Read Leonid Bershidky’s article about the looming threat of cyber crimes on businesses on NWA Online : The recent ransomware attack that brought down MRI scanners in the U.K., railroad ticket machines in Germany, interior ministry computers in Russia and parts of the FedEx network in the U.S. is bound to cause a backlash against spy […]

How a Common Language for Cyber Threats Boosts Security

Read why Steve Kirk says that having a common cyber security language can boost threat cooperation between companies on Next Gov : Cyberattacks are increasing in frequency, and government agencies are under constant attack. This nonstop assault is facilitated by the rapidly growing complexity of today’s networks. Cloud-based services, internet-of-things devices, bring-your-own-device programs and wireless […]

Security Surprises Arising from the Internet of Things (IoT)

Read Stuart Madnick article about the surprises that Internet of Things devices can throw up on Forbes : My brother can’t function in the morning until he has a cup of coffee. So I use his daily routine as an example. Picture my brother stumbling down to the kitchen one morning only to find his internet-enabled […]

Five things every employer should be doing about cybersecurity

Read Dustin Berger list five things that every employer should know about cyber security on Wyoming Business Report : Wyoming employers of all sizes, whether they know it are not, are locked in an ever-escalating arms race to keep their data safe and secure. Despite rising awareness of the risks of poor data security and […]

Five things every employer should be doing about cybersecurity

Read Dustin Berger list five things that every employer should be doing about cyber security on Wyoming Business Report : Wyoming employers of all sizes, whether they know it are not, are locked in an ever-escalating arms race to keep their data safe and secure. Despite rising awareness of the risks of poor data security […]

Strong cyber security posture reduces impact of breaches

Read why Warwick Ashford says that strong cyber security postures reduces the impact of data breaches on Computer Weekly : Protecting data is no longer just an IT problem, according to a Ponemon Institute study that highlights the damaging impact of data breaches on organisations, with share prices dropping, customer churn increasing, and reputation severely tarnished. […]

Why one of the biggest threats to cyber security is ‘security overload’

Read Stuart Laidlaw’s article about why the biggest threats to cyber security is security overload on IT Pro Portal : Chief Information Security Officers (CISOs) are responsible for managing information security risk. They do this by deploying appropriate tools, processes and resources to protect networks and digital assets from cyber-attacks. Read his full article here.

What is a DDoS attack? What happens during a DDoS attack?

Read Christina Mercer explain what is a DDoS attack and how it works on Tech World : DDoS attacks are one of the most common forms of cyber attack, with the number of global DDoS attacks increasing to 50 million annually, according to VeriSign. Distributed denial of service, or DDoS for short, refers to a cyber […]

Avoid new cloud security threats with continuous monitoring, testing

Read Kathleen Casey explain how continuous monitoring and testing can help companies avoid new cloud security threats on Tech Target : With high-profile data breaches often in headlines, cloud security threats are a top concern for enterprises. And, given the fast-paced and self-service nature of cloud computing, IT teams need to adopt a more proactive and […]

Machine learning in cybersecurity moves needle, doesn’t negate threats

Read why Mary K. Pratt says that machine learning wont negate all cyber security threats on Tech Target : Like all diligent CIOs, Will Bailey wanted to be sure that he had solid defenses against the threats lurking out in cyberspace. But Bailey, the IT director at Catholic Charities of Santa Clara County, saw some potential […]